[BACK]Return to skey.1 CVS log [TXT][DIR] Up to [local] / src / usr.bin / skey

Diff for /src/usr.bin/skey/skey.1 between version 1.3 and 1.4

version 1.3, 1996/09/27 15:41:36 version 1.4, 1996/09/29 23:04:57
Line 5 
Line 5 
 .Dt SKEY 1  .Dt SKEY 1
 .Os NetBSD 4  .Os NetBSD 4
 .Sh NAME  .Sh NAME
 .Nm S/key  .Nm skey, otp-md4, otp-md5, otp-sha1
 .Nd a one time password system  .Nd Respond to a OTP challenge.
   .Sh SYNOPSIS
   .Nm skey
   .Op Fl x
   .Op Fl md4 | Fl md5 | Fl sha1
   .Op Fl b Ar count
   .Op Fl p Ar passwd
   <sequence#>[/] key
 .Sh DESCRIPTION  .Sh DESCRIPTION
 .Nm S/key  .Nm S/key
 is a procedure for using one time passwords to authenticate access to  is a procedure for using one time passwords to authenticate access to
Line 19 
Line 26 
 .sp 0  .sp 0
     % skey  99 th91334      % skey  99 th91334
 .sp 0  .sp 0
     Enter password: <your secret password is entered here>      Enter secret password: <your secret password is entered here>
 .sp 0  .sp 0
     OMEN US HORN OMIT BACK AHOY      OMEN US HORN OMIT BACK AHOY
 .sp 0  .sp 0
Line 27 
Line 34 
 .Pp  .Pp
 The options are as follows:  The options are as follows:
 .Bl -tag -width Ds  .Bl -tag -width Ds
 .It Fl x  
 causes output to be in hexidecimal instead of ASCII.  
 .It Fl 4  
 Selects MD4 as the hash algorithm.  
 .It Fl 5  
 Selects MD5 as the hash algorithm.  
 .It Fl n Ar count  .It Fl n Ar count
 Prints out  Prints out
 .Ar count  .Ar count
Line 42 
Line 43 
 .Ar password  .Ar password
 as the secret password.  Use of this option is discouraged as  as the secret password.  Use of this option is discouraged as
 your secret password could be visible in a process listing.  your secret password could be visible in a process listing.
   .It Fl x
   causes output to be in hexidecimal instead of ASCII.
   .It Fl md4
   Selects MD4 as the hash algorithm.
   .It Fl md5
   Selects MD5 as the hash algorithm.
   .It Fl sha1
   Selects SHA (NIST Secure Hash Algorithm Revision 1) as the hash algorithm.
 .El  .El
 .Pp  .Pp
 The programs that are part of the S/Key system are:  When
 .Bl -tag -width skeyinit...  .Nm skey
 .It Xr skeyinit 1  is invoked as
 used to setup your S/Key.  .Nm otp-method ,
 .It Xr skey 1  .Nm skey
 used to get the one time password each time.  will use
 .It Xr skeyinfo 1  .Ar method
 used to extract information from the S/Key database.  as the hash function where
 It tells you what your next challenge will be.  .Ar method
 .El  is currently one of md4, md5, or sha1.
 .Pp  .Pp
 When you run  If you misspell your password while running
 .Xr skeyinit 1  
 you inform the system of your  
 secret password.  Running  
 .Xr skey 1  
 then generates the  
 one-time passwords, and also requires your secret  
 password.  If however, you misspell your password  
 while running  
 .Xr skey 1 ,  .Xr skey 1 ,
 you will get a list of passwords  you will get a list of passwords
 that will not work, and no indication about the problem.  that will not work, and no indication about the problem.

Legend:
Removed from v.1.3  
changed lines
  Added in v.1.4